Some Aspects of Cybersecurity Protection Provided for Critical Infrastructure Objects: Experience that can be Implemented in Ukraine
نویسندگان
چکیده
منابع مشابه
Cybersecurity and Critical Infrastructure Protection
Cybersecurity entails the safeguarding of computer networks and the information they contain from penetration and from malicious damage or disruption. Since the use of computer networks has become a major element in governmental and business activities, tampering with these networks can have serious consequences for agencies, firms and individuals. The question is to what degree these individua...
متن کاملCan Critical Information Infrastructure Protection be Achieved With Untested Software?
Citizens of modern societies need access to information infrastructures that are reliable, secure, non-interruptible, and fault-tolerant. In October of 1997, President Clinton’s Commission on Critical Infrastructure Protection (PCCIP) announced that the United States’s infrastructure, which is responsible for relaying information and communications, is vulnerable to information warfare attacks ...
متن کاملImproving Critical Infrastructure Cybersecurity
VeriSign, Inc. operates several of the world’s largest and most important DNS Registries (.com, .net, .gov, and more). Because of this operational role that we fulfill, we continually strive to foster and ensure the security and stability of the global Internet [10]. In this vein, we applaud the National Institute of Standards and Technology’s (NIST’s) request for information: NIST Docket Numbe...
متن کاملCan Aspects Be Injected? Experience with Replication and Protection
Separation of concerns, which allows programming the nun-functional aspects of an application in a more or less orthogonal manner from the functional code, is becoming a general trend in software development. The most widely used architectural pattern for implementing aspects involves indirection objects, raising a performance overhead at execution time. Thus, it appears as being an attractive ...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Security of the Person, Society and State
سال: 2019
ISSN: 2707-7276
DOI: 10.51369/2707-7276-2019-3-5